Image Authentication Using Fractal Watermarking and Chaos Theory

被引:0
作者
Kiani, K. [1 ]
Arian, M. [2 ]
Soleimani, V. [2 ]
机构
[1] Semnan Univ, Dept Elect, Semnan, Iran
[2] Monenco Iran Co, One Subsidiaries MAPNA grp, Dispat Trans, Tehran, Iran
来源
2010 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS) | 2010年
关键词
digital watermarking; steganography; fractal; chaos; domain region; range region;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A new approach for embedding the authentication data using fractal and chaos technique is developed in this paper. This approach is to meet the need for authentication, including fragility and inalterability. Using chaos technique and the keyword extracted from the image itself, it is so unlikely to predict the blocks used for embedding the data. The first section is dedicated to introduce digital watermarking; the next section is prepared to review the fractal coding by which we can analyze our innovative approach proposed in section three. Results are presented in section four.
引用
收藏
页数:5
相关论文
共 20 条
[1]  
[Anonymous], P IEEE INT C IM PROC
[2]  
Barnsley M.F., 1993, Fractal Image Compression
[3]  
Barnsley M. F., 1989, CHAOS FRACTALS MATH
[4]  
Barnsley M. F., 1990, US Patent, Patent No. [4,941,193, 4941193]
[5]   ITERATED FUNCTION SYSTEMS AND THE GLOBAL CONSTRUCTION OF FRACTALS [J].
BARNSLEY, MF ;
DEMKO, S .
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1985, 399 (1817) :243-275
[6]  
Caronni G, 1995, REL IT SYST VIS 95
[7]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[8]  
Delaigle J. F., SIGNAL PROCESSING, V66, P100
[9]  
Delaigle J.F, DIGITAL WATERMARKING
[10]  
Gulati K., 2003, INFORM HIDING USING